The Hacker News
- Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containersby info@thehackernews.com (The Hacker News) on April 27, 2025 at 5:02 am
Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted password spraying attacks against cloud tenants in the education sector over the past year. "The attack involves the use of AzureChecker.exe, a Command Line Interface (CLI) tool that is being used by a wide range of threat actors," the Microsoft Threat Intelligence team said in an analysis. The tech giant noted that
- ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortionby info@thehackernews.com (The Hacker News) on April 26, 2025 at 10:38 am
Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing over access to double extortion ransomware gangs like CACTUS. The IAB has been assessed with medium confidence to be a financially motivated threat actor, scanning for vulnerable systems and deploying a custom malware called LAGTOY (aka HOLERUN). "LAGTOY can be
- North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Luresby info@thehackernews.com (The Hacker News) on April 25, 2025 at 2:05 pm
North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during the fake hiring process. "In this new campaign, the threat actor group is using three front companies in the cryptocurrency consulting industry—BlockNovas LLC (blocknovas[.] com), Angeloper Agency (angeloper[.]com), and SoftGlide LLC (softglide[.]co)—to spread
- New Critical SAP NetWeaver Flaw Exploited to Drop Web Shell, Brute Ratel Frameworkby info@thehackernews.com (The Hacker News) on April 25, 2025 at 10:41 am
Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with the goal of facilitating unauthorized file uploads and code execution. "The exploitation is likely tied to either a previously disclosed vulnerability like CVE-2017-9844 or an unreported remote file inclusion (RFI) issue," ReliaQuest said in a report published this week. The cybersecurity
- Why NHIs Are Security's Most Dangerous Blind Spotby info@thehackernews.com (The Hacker News) on April 25, 2025 at 10:30 am
When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA prompt. But lurking beneath the surface is a growing threat that does not involve human credentials at all, as we witness the exponential growth of Non-Human Identities (NHIs). At the top of mind when NHIs are mentioned, most security teams immediately think of Service Accounts.
- Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Serversby info@thehackernews.com (The Hacker News) on April 25, 2025 at 8:57 am
Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that, if successfully exploited, could enable attackers to gain unauthorized access to files, inject malicious data, and tamper with logs under certain conditions. The vulnerabilities, flagged by cybersecurity vendor OPSWAT, are listed below - CVE-2025-27610 (CVSS score: 7.5) - A path traversal
- DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacksby info@thehackernews.com (The Hacker News) on April 25, 2025 at 8:43 am
Cybersecurity researchers are warning about a new malware called DslogdRAT that's installed following the exploitation of a now-patched security flaw in Ivanti Connect Secure (ICS). The malware, along with a web shell, were "installed by exploiting a zero-day vulnerability at that time, CVE-2025-0282, during attacks against organizations in Japan around December 2024," JPCERT/CC researcher Yuma
- Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Flaws and ThreatNeedle Malwareby info@thehackernews.com (The Hacker News) on April 24, 2025 at 2:11 pm
At least six organizations in South Korea have been targeted by the prolific North Korea-linked Lazarus Group as part of a campaign dubbed Operation SyncHole. The activity targeted South Korea's software, IT, financial, semiconductor manufacturing, and telecommunications industries, according to a report from Kaspersky published today. The earliest evidence of compromise was first detected in
- Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Toolsby info@thehackernews.com (The Hacker News) on April 24, 2025 at 12:58 pm
Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism called io_uring to bypass traditional system call monitoring. This causes a "major blind spot in Linux runtime security tools," ARMO said. "This mechanism allows a user application to perform various actions without using system calls," the company said in
- Automating Zero Trust in Healthcare: From Risk Scoring to Dynamic Policy Enforcement Without Network Redesignby info@thehackernews.com (The Hacker News) on April 24, 2025 at 12:56 pm
The Evolving Healthcare Cybersecurity Landscape Healthcare organizations face unprecedented cybersecurity challenges in 2025. With operational technology (OT) environments increasingly targeted and the convergence of IT and medical systems creating an expanded attack surface, traditional security approaches are proving inadequate. According to recent statistics, the healthcare sector
- 159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosureby info@thehackernews.com (The Hacker News) on April 24, 2025 at 12:55 pm
As many as 159 CVE identifiers have been flagged as exploited in the wild in the first quarter of 2025, up from 151 in Q4 2024. "We continue to see vulnerabilities being exploited at a fast pace with 28.3% of vulnerabilities being exploited within 1-day of their CVE disclosure," VulnCheck said in a report shared with The Hacker News. This translates to 45 security flaws that have been weaponized
- Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminalsby info@thehackernews.com (The Hacker News) on April 24, 2025 at 11:27 am
The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform have released new updates to their cybercrime suite with generative artificial intelligence (GenAI) capabilities. "This addition lowers the technical barrier for creating phishing pages, enabling less tech-savvy criminals to deploy customized scams in minutes," Netcraft said in a fresh report shared with The Hacker News.
- Critical Commvault Command Center Flaw Enables Attackers to Execute Code Remotelyby info@thehackernews.com (The Hacker News) on April 24, 2025 at 10:00 am
A critical security flaw has been disclosed in the Commvault Command Center that could allow arbitrary code execution on affected installations. The vulnerability, tracked as CVE-2025-34028, carries a CVSS score of 9.0 out of a maximum of 10.0. "A critical security vulnerability has been identified in the Command Center installation, allowing remote attackers to execute arbitrary code without
- WhatsApp Adds Advanced Chat Privacy to Blocks Chat Exports and Auto-Downloadsby info@thehackernews.com (The Hacker News) on April 24, 2025 at 4:03 am
WhatsApp has introduced an extra layer of privacy called Advanced Chat Privacy that allows users to block participants from sharing the contents of a conversation in traditional chats and groups. "This new setting available in both chats and groups helps prevent others from taking content outside of WhatsApp for when you may want extra privacy," WhatsApp said in a statement. The optional feature
- DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attackby info@thehackernews.com (The Hacker News) on April 23, 2025 at 5:09 pm
Multiple threat activity clusters with ties to North Korea (aka Democratic People's Republic of Korea or DPRK) have been linked to attacks targeting organizations and individuals in the Web3 and cryptocurrency space. "The focus on Web3 and cryptocurrency appears to be primarily financially motivated due to the heavy sanctions that have been placed on North Korea," Google-owned Mandiant said in
- Iran-Linked Hackers Target Israel with MURKYTOUR Malware via Fake Job Campaignby info@thehackernews.com (The Hacker News) on April 23, 2025 at 1:08 pm
The Iran-nexus threat actor known as UNC2428 has been observed delivering a backdoor known as MURKYTOUR as part of a job-themed social engineering campaign aimed at Israel in October 2024. Google-owned Mandiant described UNC2428 as a threat actor aligned with Iran that engages in cyber espionage-related operations. The intrusion set is said to have distributed the malware through a "complex
- Android Spyware Disguised as Alpine Quest App Targets Russian Military Devicesby info@thehackernews.com (The Hacker News) on April 23, 2025 at 12:22 pm
Cybersecurity researchers have revealed that Russian military personnel are the target of a new malicious campaign that distributes Android spyware under the guise of the Alpine Quest mapping software. "The attackers hide this trojan inside modified Alpine Quest mapping software and distribute it in various ways, including through one of the Russian Android app catalogs," Doctor Web said in an
- Three Reasons Why the Browser is Best for Stopping Phishing Attacksby info@thehackernews.com (The Hacker News) on April 23, 2025 at 11:00 am
Phishing attacks remain a huge challenge for organizations in 2025. In fact, with attackers increasingly leveraging identity-based techniques over software exploits, phishing arguably poses a bigger threat than ever before. Attackers are increasingly leveraging identity-based techniques over software exploits, with phishing and stolen credentials (a byproduct of phishing) now the primary
- Russian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsAppby info@thehackernews.com (The Hacker News) on April 23, 2025 at 10:49 am
Multiple suspected Russia-linked threat actors are "aggressively" targeting individuals and organizations with ties to Ukraine and human rights with an aim to gain unauthorized access to Microsoft 365 accounts since early March 2025. The highly targeted social engineering operations, per Volexity, are a shift from previously documented attacks that leveraged a technique known as device code
- Ripple's xrpl.js npm Package Backdoored to Steal Private Keys in Major Supply Chain Attackby info@thehackernews.com (The Hacker News) on April 23, 2025 at 7:17 am
The Ripple cryptocurrency npm JavaScript library named xrpl.js has been compromised by unknown threat actors as part of a software supply chain attack designed to harvest and exfiltrate users' private keys. The malicious activity has been found to affect five different versions of the package: 4.2.1, 4.2.2, 4.2.3, 4.2.4, and 2.14.2. The issue has been addressed in versions 4.2.5 and 2.14.3.